Detecting and classifying man-in-the-middle attacks in the private area network of smart grids

被引:8
作者
Elrawy, Mohamed Faisal [1 ,2 ]
Hadjidemetriou, Lenos [2 ]
Laoudias, Christos [2 ]
Michael, Maria K. [1 ,2 ]
机构
[1] Univ Cyprus, Dept Elect & Comp Engn, CY-1678 Nicosia, Cyprus
[2] Univ Cyprus, KIOS Res & Innovat Ctr Excellence, CY-1678 Nicosia, Cyprus
关键词
Cyber-security; IEC; 61850; protocol; Man-in-the-middle attack; Modbus protocol; Network intrusion detection system; Private area network; Smart grid; VIRTUAL POWER-PLANT; INTRUSION DETECTION; SECURITY; SYSTEM; FRAMEWORK;
D O I
10.1016/j.segan.2023.101167
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The sustainable development of smart grids requires the massive deployment of renewable energy, in a highly distributed manner, introducing new challenges for the system operation. Therefore, the integration of information and communication technologies in sites with Distributed Energy Resources (DERs) is needed to monitor and control the DERs operation. In this scheme, a local controller is installed at each DER site to interact with the centralized applications at the grid level and the power equipment at the site level. This local controller uses client-server protocols (e.g., Modbus TCP/IP and IEC 61850 Manufacturing Message Specification) to communicate with different power equipment in the Private Area Network (PAN) of the site. Such protocols often lack information confidentiality and integrity mechanisms. As a result, the smart grids become vulnerable to cyber-attacks. To safeguard smart grid applications, this paper proposes a Hybrid Network Intrusion Detection System approach (HNIDS), where machine learning-based anomaly and signature-based are combined. The proposed methodology detects and classifies Man-In-The-Middle (MITM) attacks in eavesdropping mode in PANs, without violating customer privacy. The ability to detect unknown MITM attack techniques, identify affected packets, and determine the victim device(s) are the major advantages of this approach. An experimental testbed has been used to collect real-life data and validate the effectiveness of the proposed approach in smart grid applications. The proposed HNIDS is evaluated using a simulation as well as real-life laboratory experiments, demonstrating very high accuracy in detection rate, from 97.6% to 100%, with an average of the weighted F1-score over 98%.
引用
收藏
页数:13
相关论文
共 55 条
  • [1] Attacks on smart grid: power supply interruption and malicious power generation
    Adepu, Sridhar
    Kandasamy, Nandha Kumar
    Zhou, Jianying
    Mathur, Aditya
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) : 189 - 211
  • [2] Industrial Control Systems: Cyberattack trends and countermeasures
    Alladi, Tejasvi
    Chamola, Vinay
    Zeadally, Sherali
    [J]. COMPUTER COMMUNICATIONS, 2020, 155 : 1 - 8
  • [3] An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems
    Almalawi, Abdulmohsen
    Fahad, Adil
    Tari, Zahir
    Alamri, Abdullah
    AlGhamdi, Rayed
    Zomaya, Albert Y.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) : 893 - 906
  • [4] Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods
    Althobaiti, Ahlam
    Jindal, Anish
    Marnerides, Angelos K.
    Roedig, Utz
    [J]. IEEE ACCESS, 2021, 9 : 159291 - 159312
  • [5] [Anonymous], 2023, Datasets of man-in-the-middle attacks targeting modbus TCP/IP and MMS protocols in the smart grid, DOI [10.5281/zenodo.8375657, DOI 10.5281/ZENODO.8375657]
  • [6] Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects
    Berghout, Tarek
    Benbouzid, Mohamed
    Muyeen, S. M.
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2022, 38
  • [7] Chen B, 2015, IEEE INT WORK TECH
  • [8] A Survey of Man In The Middle Attacks
    Conti, Mauro
    Dragoni, Nicola
    Lesyk, Viktor
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 2027 - 2051
  • [9] A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems
    Cruz, Tiago
    Rosa, Luis
    Proenca, Jorge
    Maglaras, Leandros
    Aubigny, Matthieu
    Lev, Leonid
    Jiang, Jianmin
    Simoes, Paulo
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (06) : 2236 - 2246
  • [10] Divekar A, 2018, PROCEEDINGS ON 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), P1, DOI 10.1109/CCCS.2018.8586840